SCOR Q51-100
![]() |
![]() |
![]() |
Title of test:![]() SCOR Q51-100 Description: SCOR 350-701 |




New Comment |
---|
NO RECORDS |
Which type of dashboard does Cisco DNA Center provide for complete control of the network?. distributed management. service management. application management. centralized management. Refer to the exhibit. What will happen when this Python script is run?. The list of computers, policies, and connector statuses will be received from Cisco AMP. The list of computers and their current vulnerabilities will be received from Cisco AMP. The compromised computers and malware trajectories will be received from Cisco AMP. The compromised computers and what compromised them will be received from Cisco AMP. Refer to the exhibit. What will happen when the Python script is executed?. The hostname will be printed for the client in the client ID field. The hostname will be translated to an IP address and printed. The script will pull all computer hostnames and print them. The script will translate the IP address to FQDN and print it. With which components does a southbound API within a software-defined network architecture communicate?. applications. controllers within the network. appliances. devices such as routers and switches. Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?. BYOD onboarding. MAC authentication bypass. client provisioning. Simple Certificate Enrollment Protocol. What are the two characteristics of Cisco DNA Center APIs? (Choose two.). They are Cisco proprietary. They do not support Python scripts. They view the overall health of the network. They quickly provision new devices. Postman is required to utilize Cisco DNA Center API calls. A company discovered an attack propagating through their network via a file. A custom file detection policy was created in order to track this in the future and ensure no other endpoints execute to the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the policy created is functioning as it should?. Create an IP block list for the website from which the file was downloaded. Block the application that the file was using to open. Upload the hash for the file into the policy. Send the file to Cisco Threat Grid for dynamic analysis. Refer to the exhibit. What does the Python script accomplish?. It authenticates to a Cisco ISE server using the username or ersad. It lists the LDAP users from the external identity store configured on Cisco ISE. It authenticates to a Cisco ISE with an SSH connection. It allows authentication with TLSv1 SSL protocol. What is the difference between GETVPN and IPsec?. GETVPN is used to build a VPN network with multiple sites without having to statically configure all devices. GETVPN is based on IKEv2 and does not support IKEv1. GETVPN provides key management and security association management. GETVPN reduces latency and provides encryption over MPLS without the use of a central hub. Which algorithm provides asymmetric encryption?. RSA. AES. RD4. 3DES. What is the difference between an XSS attack and an SQL injection attack?. SQL injection is a hacking method used to attack SQL databases, whereas XSS attack can exist in many different types of applications. XSS attacks are used to steal information from databases, whereas SQL injection attacks are used to redirect users to websites where attackers can steal data from them. XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications. SQL injection attacks are used to steal information from databases, whereas XSS attacks are used to redirect users to websites where attackers can steal data from them. What is the difference between a DoS attack and DDos attack?. A DoS attack is where a computer is used to flood a server with TCP packets, whereas DDoS attack is where a computer is used to flood a server with UDP packets. A DoS attack is where a computer is used to flood a server with UDP packets, whereas DDoS attack is where a computer is used to flood a server with TCP packets. A DoS attack is where a computer is used to flood a server with TCP and UDP packets, whereas DDoS attack is where a computer is used to flood multiple servers that are distributed over a LAN. A DoS attack is where a computer is used to flood a server with TCP and UDP packets, whereas DDoS attack is where multiple systems target a single system with a DoS attack. What are the two advantages of using Cisco AnyConnect over DMVPN? (Choose two.). It provides spoke-to-spoke communications without traversing the hub. It enables VPN access for individual users from their machines. It allows multiple sites to connect to the data center. It allows different routing protocols to work over the tunnel. It allows customization of access policies based on user identity. What is the difference between a vulnerability and an exploit?. A vulnerability is a weakness that can be exploited by an attacker. A vulnerability is a hypothetical event for an attacker to exploit. An exploit is a hypothetical event that causes a vulnerability in the network. An exploit is a weakness that can cause a vulnerability in the network. What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?. threat intelligence. Indicators of Compromise. trusted automated exchange. The Exploit Database. Refer to the exhibit. An engineer is implementing a certificate-based VPN. What is the result of the existing configuration?. Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully. The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy. The OU of the IKEv2 peer certificate is set to MANGLER. The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER. Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?. event. intent. integration. multivendor. A network engineer needs to select a VPN type that provides the most stringent security, multiple security associations for the connections, and efficient VPN establishment with the least bandwidth consumption. Why should the engineer select either FlexVPN or DMVPN for this environment?. DMVPN because it uses multiple SAs and FlexVPN does not. DMVPN because it supports IKEv2 and FlexVPN does not. FlexVPN because it supports IKEv2 and DMVPN does not. FlexVPN because it uses multiple SAs and DMVPN does not. Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?. show authentication registrations. show authentication method. show dot1x all. show authentication sessions. snmp-server group SNMP v3 auth access 15 Refer to the exhibit. What does the number 15 represent in this configuration?. privilege level for an authorized user to this router. access list that identifies the SNMP devices that can access the router. interval in seconds between SNMPv3 authentication attempts. number of possible failed attempts until the SNMPv3 user is locked out. What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX. Which command enables 802.1X globally on a Cisco switch?. dot1x system-auth-control. dot1x pae authenticator. authentication port-control auto. aaa new-model. What is a characteristic of Dynamic ARP Inspection?. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database. In a typical network, make all ports as trusted except for the ports connecting to switches, which are untrusted. DAI associates a trust state with each switch. DAI intercepts all ARP requests and responses on trusted ports only. Which statement about IOS zone-based firewalls is true?. An unassigned interface can communicate with assigned interfaces. Only one interface can be assigned to a zone. An interface can be assigned to multiple zones. An interface can be assigned only to one zone. When wired 802.1X authentication is implemented, which two components are required? (Choose two.). authentication server: Cisco Identity Service Engine. supplicant: Cisco AnyConnect ISE Posture module. authenticator: Cisco Catalyst switch. authenticator: Cisco Identity Services Engine. authentication server: Cisco Prime Infrastructure. Which SNMPv3 configuration must be used to support the strongest security possible?. asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy. asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy. asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv 3des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy. asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy. Under which two circumstances is a CoA issued? (Choose two.). A new authentication rule was added to the policy on the Policy Service node. An endpoint is deleted on the Identity Service Engine server. A new Identity Source Sequence is created and referenced in the authentication policy. An endpoint is profiled for the first time. A new Identity Service Engine server is added to the deployment with the Administration persona. Which ASA deployment mode can provide separation of management on a shared appliance?. DMZ multiple zone mode. transparent firewall mode. multiple context mode. routed mode. Refer to the exhibit. Which command was used to display this output?. show dot1x all. show dot1x. show dot1x all summary. show dot1x interface gi1/0/12. What is a characteristic of Cisco ASA NetFlow v9 Secure Event Logging?. It tracks flow-create, flow-teardown, and flow-denied events. It provides stateless IP flow tracking that exports all records of a specific flow. It tracks the flow continuously and provides updates every 10 seconds. Its events match all traffic classes in parallel. A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0383320506 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?. snmp-server host inside 10.255.254.1 snmpv3 andy. snmp-server host inside 10.255.254.1 version 3 myv3. snmp-server host inside 10.255.254.1 snmpv3 myv3. snmp-server host inside 10.255.254.1 version 3 andy. An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used?. flow exporter <name>. ip flow-export destination 1.1.1.1 2055. flow-export destination inside 1.1.1.1 2055. ip flow monitor <name> input. Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.). Define a NetFlow collector by using the flow-export command. Create a class map to match interesting traffic. Create an ACL to allow UDP traffic on port 9996. Enable NetFlow Version 9. Apply NetFlow Exporter to the outside interface in the inbound direction. HQ_Router(config)# username admin5 privilege 5 HQ_Router(config)# privilege interface level 5 shutdown HQ_Router(config)# privilege interface level 5 ip HQ_Router(config)# privilege interface level 5 description Refer to the exhibit. A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration?. set the IP address of an interface. add subinterfaces. complete no configurations. complete all configurations. A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0383320506 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN?. Change the password on host A to the default password. Enter the command with a different password on host B. Enter the same command on host B. Change isakmp to ikev2 in the command on host A. How many interfaces per bridge group does an ASA bridge group deployment support?. up to 16. up to 2. up to 4. up to 8. A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the Interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?. DHCP snooping has not been enabled on all VLANs. Dynamic ARP inspection has not been enabled on all VLANs. The ip arp inspection limit command is applied on all interfaces and is blocking the traffic of all users. The no ip arp inspection trust command is applied on all user host interfaces. What is the difference between FlexVPN and DMVPN?. DMVPN uses only IKEv1. FlexVPN uses only IKEv2. FlexVPN uses IKEv2. DMVPN uses IKEv1 or IKEv2. DMVPN uses IKEv1 or IKEv2. FlexVPN only uses IKEv1. FlexVPN uses IKEv1 or IKEv2. DMVPN uses only IKEv2. Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right. provides detection, blocking, tracking and remediation to protect against targated persistent malware attacks. provides superior threat prevention and mitigation for known and unknown threats. Provides outbreak control through custom detections. Provides the root cause of a threat based on the indicators of compromise seen. Provides the ability to perform network discovery. Provides intrusion prevention before malware comprises the host. An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?. sFlow. NetFlow. mirror port. VPC flow logs. An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing. Which action should be taken to accomplish this goal?. Generate the RSA key using the crypto key generate rsa command. Configure the port using the ip ssh port 22 command. Enable the SSH server using the ip ssh server command. Disable telnet using the no ip telnet command. Refer to the exhibit. Which type of authentication is in use?. POP3 authentication. SMTP relay server authentication. external user and relay mail authentication. LDAP authentication for Microsoft Outlook. ip dhcp snooping ip dhcp snooping vlan 41,44 ! interface GigabitEthernet1/0/1 description Uplink_Tuo_Distro_Switch_g1/0/11 switchport trunk native vlan 999 switchport trunk allowed vlan 40,41,44 switchport mode trunk Refer to the exhibit. An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained. Which command should be configured on the switch interface in order to provide the user with network connectivity?. ip dhcp snooping limit 41. ip dhcp snooping verify mac-address. ip dhcp snooping trust. ip dhcp snooping vlan 41. Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?. Site-to-site VPN preshared keys are mismatched. Site-to-site VPN peers are using different encryption algorithms. No split-tunnel policy is defined on the Firepower Threat Defense appliance. The access control policy is not allowing VPN traffic in. Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?. interesting traffic was not applied. encryption algorithm mismatch. authentication key mismatch. hashing algorithm mismatch. Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?. group policy. access control policy. device management policy. platform settings policy. The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?. Certificate Trust List. Endpoint Trust List. Enterprise Proxy Service. Secured Collaboration Proxy. Which two application layer preprocessors are used by Firepower Next-Generation Intrusion Prevention System? (Choose two.). SIP. inline normalization. SSL. packet decoder. modbus. Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?. quality of service. time synchronization. network address translations. intrusion policy. Which information is required when adding a device to Firepower Management Center?. username and password. encryption method. device serial number. registration key. |